Font Size: a A A

Used In The Backbone Layer Network Switches, Access Control Technology

Posted on:2007-05-22Degree:MasterType:Thesis
Country:ChinaCandidate:J L LiFull Text:PDF
GTID:2208360185455795Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the great development of information technology and network application, 21st century became Internet age. While constructing network systems, usually we pay much attention to the structure and functions of the network with going to network security. Some departments are suffering from destroyed data while benefiting from the network, data security and their interest are under serious threat.Network security is greatly affected by ISP's system. Effective management of all the nodes in ISP's system would reduce network risk. Technically speaking, these nodes of ISP's system are usually routes & switches in backbone network. Access control list can be used to filter away dangerous packets and give some level of protection to the network. Currently, only few domestic device manufacturers can produce switches for core network, so this method of utilizing access control list in core network switches is a leading technology domestically.Access control is a method to explicitly allow or limit access right or scope. The service of access control could limit the access to key resources, prevent illegal users from breaking in and also prevent legal user s from destroying these resources inadvertently.As an innovation of this paper, access control list software is constructed with distributed structures, and definition of sub-modules hides the design details and data structure. This design makes software maintenance and porting much easier.
Keywords/Search Tags:access control list, network core switch, embedded device, Quality of Service
PDF Full Text Request
Related items